Cyber Threat Analyst, Gts - Technology Command Centre
Posted on Jan. 6, 2025 by OCBC Bank
- Robertsganj, Singapore
- N/A
- Full Time
Cyber Threat Analyst, GTS - Technology Command Centre - (2500000R)
The candidate is responsible for performing monitoring and analysing cyber threats that occur within the organisation. The candidate is expected to provide accurate evaluation, escalation of cyber incidents to the management and perform containment of incidents.
The candidate will operate in a 24x7 cyber security operations centre (located in the East). Advancement opportunities will be given to candidates with exemplary performance.
Main Responsibility
- Perform monitoring, analysis/investigation and escalation of real-time security events.
- Provide timely detection, identification and containment of possible cyber-attacks/intrusions.
- Determine the effectiveness and impact assessment of an observed attack.
- Log security events and manage till closure
- Ensure that Service Level Agreements are met
- Additional responsibilities will include reporting, documenting cyber security events, as well as supporting the team in cyber security related matters.
The candidate should ideally hold a Degree or Diploma related to the field of cyber security.- Both fresh graduates and candidates with relevant experience are welcomed to apply. On-the-job training will be provided.
- Knowledge of common network tools (e.g., ping, traceroute, nslookup)
- Knowledge of cyber defence policies, procedures, and regulations
- Knowledge of different types of network communication (e.g., Local Area Network [LAN], Wide Area Network [WAN], Metropolitan Area Network [MAN], Wireless Wide Area Network [WWAN], Wireless Local Area Network [WLAN])
- Knowledge of SIEM, Intrusion Detection System (IDS) tools and applications
- Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution)
- Knowledge of vulnerability assessment tools, including open source tools, and their capabilities
- Knowledge of incident response and handling methodologies
- Knowledge of general attack stages (e.g., footprinting and scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks)
- Knowledge of the cyber defence service provider reporting structure and processes within one’s own organization
- Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code)Language/Structured Query Language [PL/SQL]
- Ability to interpret and incorporate data from multiple tool sources
- Knowledge of file extensions (e.g. .dll, .bat, .zip, .pcap, .gzip)
- Knowledge of the common attack vectors on the network layer
- Skill in reading and interpreting signatures (e.g., Snort)
- Knowledge of web filtering technologies
- Knowledge of intrusion detection methodologies and techniques for detecting host- and network-based intrusions via intrusion detection technologies
- Knowledge of host/network access controls (e.g., access control list)
- Knowledge of network protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Dynamic Host Configuration Protocol [DHCP]) and directory services (e.g., Domain Name System [DNS])
- Knowledge of the common networking protocols (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP]) and services (e.g., web, mail, Domain Name System [DNS]) and how they interact to provide network communications
- Knowledge of Windows command line (e.g., ipconfig, netstat, dir, nbtstat)
- Knowledge of Defence-in-depth principles and network security architecture
- Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol and Internet Protocol [TCP/IP], Open System Interconnection model [OSI], Information Technology Infrastructure Library [ITIL])
- Knowledge of signature implementation impact
- Skill in recognizing and categorizing types of vulnerabilities and associated attacks
- Skill in detecting host and network-based intrusions via intrusion detection technologies
Primary Location: Singapore
Job: Information Technology
Organization: Group Technology Services
Schedule: Permanent
Job Posting: 06-Jan-2025, 1:46:18 AM
Advertised until:
Feb. 5, 2025
Are you Qualified for this Internship Role?
Click Here to Tailor Your Resume to Match this Job
Share with Friends!
Similar Internships
No similar Intern Jobs at the Moment!